Search Results - (( development using text algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- development using »
- java application »
- text algorithm »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Development of web based learning content of animation algorithm on searching and sorting techniques / Nur Linda Abdi Nur
Published 2007“…It is not easy to study searching and sorting algorithm with only refers to the text algorithm like in text books. …”
Get full text
Get full text
Thesis -
4
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012Get full text
Get full text
Thesis -
5
-
6
Development of DNA fragment assembly using idury-waterman algorithm / Nurul Azyanny Mustaffa
Published 2013Get full text
Get full text
Student Project -
7
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Text searching algorithm using boyer moore horspool (BMH) algorithm
Published 2015“…The objective of this study is to develop a searching function using Boyer-Moore Horspool algorithm based on keyword in a medical database. …”
Get full text
Get full text
Undergraduates Project Papers -
10
-
11
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
12
-
13
-
14
-
15
-
16
-
17
-
18
The use of people rank technique for data dissemination in opportunistic network
Published 2015Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
-
20
Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis
Published 2017Get full text
Get full text
Thesis
